Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Spell check suggestion: %220mb 22!490 Llorente 22 ?

Refine your search
  • [x] Creation time: Last month
Sort order
  • Date
  • Score
Content type
  • Article (Print) (76)
Keywords

« Previous 1 2 3 4 5 6 7 8 Next »

36%
Connecting dissimilar IPsec implementations
30.11.2025
Home »  Archive  »  2011  »  Issue 4: Secure...  » 
© Yuri Arcurs, 123RF.com
192.168.2.0/24; 21 service any; 22 } 23 IPsec-policy pfs2-aes256-sha1; 24 } 25 } 26 } 27 } Again you can reuse the proposal and the policy. Assuming
35%
Monitoring for small and medium-sized companies compared
30.11.2025
Home »  Archive  »  2012  »  Issue 07: Xen v...  » 
starter kit: https://www.icinga.org/2010/09/22/starter-kit-icinga-virtual-appliance/ Zabbix appliance: http://www.vmware.com/appliances/directory/353
35%
pfSense firewall and router distribution
30.11.2025
Home »  Archive  »  2012  »  Issue 07: Xen v...  » 
© Sergey Mironov, 123RF.com
). Figure 13: These settings prevent the computer with the IP address of 192.168.1.66 from accessing TCP port 22 – that is, the SSH service. You need to watch out for two pitfalls here: Because
35%
Introduction to behavior-driven monitoring
30.11.2025
Home »  Archive  »  2011  »  Issue 3: Are yo...  » 
Mariya Herasymenko, 123RF
Scenarios: 21 cucumber /usr/lib/nagios/plugins/cucumber-nagios/checks/features/www.xing.com/startpage.feature:4 # Scenario: Visiting home page 22 23 1 scenario (1 failed) 24 4 steps (1 failed, 3 skipped) 25 0
35%
Clustering with OpenAIS and Corosync
30.11.2025
Home »  Archive  »  2011  »  Issue 3: Are yo...  » 
brunoilfo, 123RF.com
rhcsNodename: iscsi1 15 rhcsCluster-id: 46516 16 cn: cman 17 objectclass: rhcsCman 18 19 dn: cn=clusternodes,name=cluster,dc=tuxgeek,dc=de 20 cn: clusternodes 21 objectclass: nsContainer 22 23 dn: cn
35%
Network analysis with Wireshark
30.11.2025
Home »  Archive  »  2011  »  Issue 5: Pen Te...  » 
© Reinhard Eisele
capture or display filters. The capture filter would look like this: port 22 Then start capturing, initiate an SSH login at the console, and in the Analyze menu, select Follow TCP Stream . The result
35%
High-availability workshop: GFS with DRBD and Pacemaker
30.11.2025
Home »  Archive  »  2012  »  Issue 07: Xen v...  » 
© Maxim Borovkov, 123RF.com
17 18 19 20 21 22 23 This example also
35%
Finding cracks with Nmap, Portbunny, and Nessus
30.11.2025
Home »  Archive  »  2010  »  Issue 0: Active...  » 
Fotoflash, Fotolia.com
to popular ports, such as 80 (HTTP) or 22 (SSH), and pings. If Portbunny does not register a response to a port request, but the trigger packet reaches the target, it tags the port as filtered. Using Portbunny
35%
Professional backup solutions compared
30.11.2025
Home »  Archive  »  2010  »  Issue 2: Backup...  » 
Kamil Macniak, 123RF
As of kernel 2.4.x As of kernel 2.2.x Asianux/Red Flag, CentOS, Debian, Novell OES, Red Hat, SUSE, Ubuntu BSD – FreeBSD, NetBSD, OpenBSD No No Free
35%
I/O benchmarks with Fio
30.11.2025
Home »  Archive  »  2011  »  Issue 5: Pen Te...  » 
© Kheng Ho Toh, 123RF.com
] 13 rw=randread 14 runtime=60 15 16 [sequentialread] 17 stonewall 18 rw=read 19 runtime=60 20 21 [randomwrite] 22 stonewall 23 rw=randwrite 24 runtime=60 25 26 [sequentialread] 27 stonewall 28 rw

« Previous 1 2 3 4 5 6 7 8 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice